IT Management  >   Systems Operations  >   Network Management  >   Network Performance  >  

Network Anomaly Detection

RSS Feed    Add to Google    Add to My Yahoo!
Network Anomaly DetectionReports
 
What to Look for When Evaluating Next-Generation Firewalls (Edu)
sponsored by Dell Software
WHITE PAPER: This paper summarizes the results of three independent tests conducted by Network World, ICSA Labs and NSS Labs comparing next-generation firewall performance, cost and functionality.
Posted: 24 Mar 2014 | Published: 10 Dec 2012

Dell Software

Ixia Black Book: 802.11ac Wi-Fi Benchmarking
sponsored by Ixia
WHITE PAPER: Examine 802.11ac Wi-Fi test methodologies in this white paper, which provides insight into the capabilities and features that matter most.
Posted: 07 Mar 2014 | Published: 07 Mar 2014

Ixia

VXLAN Monitoring: How to Gain Virtual Network Overlay Visibility
sponsored by Ixia
EGUIDE: This expert E-Guide from SearchNetworking.com provides the information you need to gain virtual network overlay visibility for proper VXLAN monitoring. View now to learn more about VXLAN and which readily available tools can help you overcome the visibility hurdle.
Posted: 13 Dec 2012 | Published: 13 Dec 2012

Ixia

Packet Capture in High-Speed and Data Center Networks
sponsored by WildPackets, Inc.
WEBCAST: This in-depth webcast explores the impact high-speed networking, changing traffic patterns, and new capture points have on network monitoring today and reveals key places you must capture data to truly achieve the visibility you need to ensure optimal network performance.
Posted: 03 Sep 2013 | Premiered: Sep 3, 2013

WildPackets, Inc.

Unified Visibility Fabric Architecture – A New Approach to Visibility
sponsored by Gigamon
WHITE PAPER: In this informative white paper, uncover a unified visibility fabric architecture that centralizes network monitoring and management tools for improved and simplified performance and security analysis.
Posted: 24 Sep 2013 | Published: 30 Aug 2013

Gigamon

Practitioners Guide to Establishing a SOC Webinar
sponsored by AlienVault
WEBCAST: This AlienVault Unified Security Management (USM) webinar is intended for a technical audience and will provide the core information necessary to evaluate the security controls essential to establishing an efficient Security Operation Center (SOC).
Posted: 16 Jul 2013 | Premiered: Jul 16, 2013

AlienVault

Improve App Delivery with an HTML Rewrite
sponsored by F5 Networks
EGUIDE: This E-Guide from SearchNetworking.com describes why many web content optimization startups are rewriting HTML and how your organization can benefit from these results. View now to learn more!
Posted: 12 Dec 2012 | Published: 12 Dec 2012

F5 Networks

Presentation Transcript: BYOD: The Risks of Allowing Personal Mobile Devices On Corporate Networks and How to Mitigate Them
sponsored by BlueCoat
PRESENTATION TRANSCRIPT: Uncover why MDM and MAM are inefficient at solving the real problem mobile devices present to your network: traffic.
Posted: 20 Nov 2012 | Published: 20 Nov 2012

BlueCoat

How The Burgiss Group Manages Business Risk with AppFirst
sponsored by AppFirst
CASE STUDY: This case study reveals which solution the Burgiss Group trusts to help them monitor the behavior of their applications and systems and – in turn – ensure an optimal experience for their clients. View now to learn more!
Posted: 04 Sep 2013 | Published: 04 Sep 2013

AppFirst

Presentation Transcript: Customer Experience Focused Transformation
sponsored by Alcatel-Lucent
PRESENTATION TRANSCRIPT: This presentation transcript discusses Telecom Service Provider Transformations as well as business strategies and models to improve quality of experience, including customer experience management planning and the role-managed services can play in this transformation.
Posted: 14 Apr 2011 | Published: 14 Apr 2011

Alcatel-Lucent
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement